Trust Assessment
arc-sentinel received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 15 findings: 5 critical, 3 high, 6 medium, and 1 low severity. Key findings include File read + network send exfiltration, Sensitive environment variable access: $HOME, Sensitive environment variable access: $AWS_CREDS.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 10/100, indicating areas for improvement.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings15
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | File read + network send exfiltration Package manager / git credential file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:203 | |
| CRITICAL | File read + network send exfiltration Package manager / git credential file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:205 | |
| CRITICAL | File read + network send exfiltration Package manager / git credential file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:208 | |
| CRITICAL | Arbitrary command execution via sourced configuration file The `sentinel.sh` script sources `sentinel.conf` (line 19), which is explicitly designed to be user-edited according to `SKILL.md`. This allows an attacker to inject arbitrary shell commands into `sentinel.conf` that will be executed with the script's permissions when `sentinel.sh` is run. Avoid sourcing user-controlled configuration files directly. Instead, parse configuration files using a safer method (e.g., `read` line by line, or a dedicated config parser) and validate inputs. If sourcing is unavoidable, ensure the file is owned by root and not writable by non-privileged users, or use a restricted shell. | LLM | sentinel.sh:19 | |
| CRITICAL | Command injection via unquoted user-controlled variables in curl command The `MONITOR_EMAIL` and `HIBP_API_KEY` variables, loaded from the user-editable `sentinel.conf`, are used unquoted in a `curl` command (line 137). This allows an attacker to inject additional `curl` options (e.g., `--data @/etc/passwd` for data exfiltration) or shell commands (e.g., `; rm -rf /`) into the `curl` execution. Always quote variables when using them in shell commands, especially when they contain user-controlled input. For `curl`, ensure variables are properly escaped if they are part of the URL or headers, or use shell parameter expansion with quoting (e.g., `"${MONITOR_EMAIL@Q}"` if using Bash 4.4+). | LLM | sentinel.sh:137 | |
| HIGH | Sensitive path access: Package registry credentials Access to Package registry credentials path detected: '~/.npmrc'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:203 | |
| HIGH | Sensitive path access: Package registry credentials Access to Package registry credentials path detected: '~/.npmrc'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:205 | |
| HIGH | Sensitive path access: Package registry credentials Access to Package registry credentials path detected: '~/.npmrc'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:208 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/arc-claw-bot/arc-sentinel/scripts/permission-auditor.sh:88 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/arc-claw-bot/arc-sentinel/scripts/skill-auditor.sh:19 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:98 | |
| MEDIUM | Sensitive environment variable access: $AWS_CREDS Access to sensitive environment variable '$AWS_CREDS' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:213 | |
| MEDIUM | Sensitive environment variable access: $AWS_ACCESS_KEY_ID Access to sensitive environment variable '$AWS_ACCESS_KEY_ID' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/arc-claw-bot/arc-sentinel/scripts/token-watchdog.sh:222 | |
| MEDIUM | Sensitive environment variable access: $GITHUB_USER Access to sensitive environment variable '$GITHUB_USER' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/arc-claw-bot/arc-sentinel/sentinel.sh:24 | |
| LOW | Node lockfile missing package.json is present but no lockfile was found (package-lock.json, pnpm-lock.yaml, or yarn.lock). Commit a lockfile for deterministic dependency resolution. | Dependencies | skills/arc-claw-bot/arc-sentinel/package.json |
Scan History
Embed Code
[](https://skillshield.io/report/0cc5e2b632a1c62c)
Powered by SkillShield